Although Regular Expressions (RegExes) have been widely used in network security applications, their inherent complexity often limits the total number of RegExes that can be detec...
The effectiveness of direct volume rendering is difficult to validate and users may not know whether they have successfully explored the data or not. This limits its applications....
This paper describes the development and application of methods to integrate research image analysis methods and software with a commercial image guided surgery navigation system ...
Xenophon Papademetris, Kenneth P. Vives, Marcello ...
Vision-based user interfaces enable natural interaction modalities such as gestures. Such interfaces require computationally intensive video processing at low latency. We demonstr...
Ming-yu Chen, Lily B. Mummert, Padmanabhan Pillai,...
—The purpose of this paper is to present the linkage of Thetis (a real time multi-vehicles hybrid simulator for heterogeneous vehicles) with a control architecture for the manage...